aws-secretsmanager
Verified for current stable LTS
Aws Secretsmanager Command: Rotate Secret Auto
An engineer would use the command to automate the rotation of sensitive secrets stored in AWS Secrets Manager every 30 days by associating it with a specific AWS Lambda function designed to handle the rotation logic. Exact CLI syntax to rotate secret auto using Aws Secretsmanager.
When to use this: An engineer would use the command to automate the rotation of sensitive secrets stored in AWS Secrets Manager every 30 days by associating it with a specific AWS Lambda function designed to handle the rotation logic.
Command Syntax
aws secretsmanager rotate-secret --secret-id <name|arn> --rotation-lambda-arn <arn_of_lambda_function> --rotation-rules AutomaticallyAfterDays=<30> aws secretsmanager rotate-secret --secret-id <name|arn> --rotation-lambda-arn <arn_of_lambda_function> --rotation-rules AutomaticallyAfterDays=<30> Command Breakdown
--secret-id- Command Option
- Tool-specific option used by this command invocation.
--rotation-lambda-arn- Command Option
- Tool-specific option used by this command invocation.
--rotation-rules- Command Option
- Tool-specific option used by this command invocation.
FAQ
Purpose: Exact syntax to rotate secret auto using Aws Secretsmanager.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
Aws Secretsmanager Command: List Secrets
aws secretsmanager list-secrets Aws Secretsmanager Command: Delete Secret aws secretsmanager delete-secret --secret-id <name|arn> Aws Secretsmanager Command: Describe Secret aws secretsmanager describe-secret --secret-id <name|arn> Aws Secretsmanager Command: List Secrets Query aws secretsmanager list-secrets --query 'SecretList[*].{Name: Name, ARN: ARN}' Aws Secretsmanager Command: Create Secret aws secretsmanager create-secret --name <name> --description "<secret_description>" --secret-string '<secret>'